Lesson 2.1 Flashcards
a combination of texts, numbers, and/or
special characters to secure accounts
● can be weak (e.g. names, common words,
birthdates, etc.) or strong (combination of all
characters)
password
The ____,
also known as
_____, is
virtual in nature
and unbounded
unlike our physical
environment.
Cyber World
Cyberspace
____
● a digital representation of
humans to interact in
virtual world
Virtual Self
● data that are
available to
anyone as
long as they
have an
internet
connection
Source of
Information
___
● digital
socialization
using chat,
blogs, vlogs,
online games,
etc.
Social
Interaction
Tools for Social
Interaction
● ____
Facebook
● Twitter
● Tumblr
● Instagram
● Online games
(Mobile
Legends,
____
● stealing and accessing
private information of
organizations such as
government systems,
business systems, etc.
Hacking
____
● the act of stealing
important
information from
the target user by
accessing online
accounts such as
bank accounts,
etc.
Identity Theft
____
● individuals
who lure
children or
teenagers to
engage in
sexual acts or
relationships
online
Internet
Predators
____
● an online act
of humiliation
and/or threats
that is done
with and by
children and
teenagers
Cyberbullying
___
● also known as malware,
is created to invade and
destroy computer
systems
Malicious Software
Types of
Malware
● virus
● worms
● trojan
● spyware
● adware
● ransomware
● fileless
malware